Explain how a shared region could be used for a process to read data written by the kernel. Include
in your explanation what would be necessary for synchronization.
What will be an ideal response?
The shared region is mapped read-only into the process’s address space, but is writable by the kernel.The
process reads data from the region using standard LOAD instructions (avoiding a TRAP). The process may
poll the data in the region from time to time to see if it has changed. However, we may require a way for the
kernel to notify the process when it has written new data. A software interrupt can be used for this purpose.
You might also like to view...
Answer the following statements true (T) or false (F)
1. A weakness of the IDES approach is its lack of flexibility. ?? 2. To be of practical use an intrusion detection system should detect a substantial percentage of intrusions while keeping the false alarm rate at an acceptable level. ? 3. ? System administrators can stop all attacks and hackers from penetrating their systems by installing software patches periodically. ? 4. Password crackers rely on the fact that some people choose easily guessable passwords. ?? 5. ?Traditional hackers usually have specific targets, or at least classes of targets in mind. ?
?Which of the following steps is the first step in goals-based strategic planning?
A. Define strategies B. ?Set direction C. ?Deploy plan D. ?Analyze situation
Use one statement to assign the sum of x and y to z, then increment x by 1.
Write Java statements to accomplish each of the tasks.
Security settings may be changed in the browser to allow you to view
A) dynamic content B) active content C) interactive content D) static content